28
Views
0
CrossRef citations to date
0
Altmetric
Research paper

Toward a secure protection scheme for visual secret sharing

, , &
Pages 342-352 | Received 31 May 2013, Accepted 24 Jul 2013, Published online: 06 Dec 2013

References

  • Naor M and Shamir A. Visual cryptography, In Advances in Cryptology-Proceedings of Eurocypto 94, (Ed. A. De Santis), Lecture Notes in Computer Science, 1995, 950, pp. 1–12 (Springer-Verlag, New York).
  • Naor M and Pinkas B. Visual authentication and identification, In Advances in Cryptology-Proceedings of Eurocypto 97, (Ed. B. S. Kaliski Jr), Lecture Notes in Computer Science, 1997, 1294, pp. 322–336 (Springer-Verlag, New York).
  • Chang CC and Chuang JC. An image intellectual property protection scheme forgray-level image using visual secret sharing strategy. Pattern Recogn. Lett., 2002, 23, (8), 931–941.
  • Wang CC, Tai SC and Yu CS. Repeating image watermarking technique by the visual cryptography. IEICE Trans. Fundament. Electron., Commun. Comput. Sci., 2000, E83-A, (8), 1589–1598.
  • Blakley G. Safeguarding cryptographic keys, Proc. AFIPS 1979 Natl. Conf., New York, USA, June 1979, AFIPS, Vol. 48, pp. 313–317.
  • Shamir A. How to share a secret. Commun. ACM, 1979, 22, (11), 612–613.
  • Horng GB, Chen TH and Tsai DS. Cheating in visual cryptography. Des., Codes Cryptogr., 2006, 38, (2), 219–236.
  • Carpenteri M. A perfect threshold secret sharing scheme to identify cheaters. Des., Codes Cryptogr., 1995, 5, (3), 183–187.
  • Chang CC and Hwang RJ. Efficient cheater identification method for threshold schemes. IEE Proc. Comput. Digit. Tech., 1997, 144, (1), 23–27.
  • Tompa M.and Woll H. How to share a secret with cheaters. J. Cryptol., 1988, 1, (2), 133–138.
  • Ogata W and Kurosawa K. Optimum secret sharing scheme secure against cheating, In Advances in Cryptology-Proceedings of Eurocypto 96, (Ed. U. M. Maurer), Lecture Notes in Computer Science, 1996, 1070, pp. 200–211 (Springer-Verlag, New York).
  • Tsai DS, Chen TH and Horng GB. A cheating prevention scheme for binary visual cryptography with homogeneous secret images. Pattern Recogn., 2007, 40, (8), 2356–2366.
  • Simmons GJ. An introduction to shared secret and/or shared control schemes and their applications. Contemporary Cryptology, 1991, pp.491–497, (IEEE Press, Piscataway).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.